Protecting the End-PointsBy Baselinemag | Posted 2007-08-14 Email Print
Modernizing Authentication — What It Takes to Transform Secure Access
As mobile devices get smaller, become more widespread and harbor an increasing amount of business data, I.T. executives are using new strategies and software tools to keep these devices secure. Story Guide:
Vendor Profiles Also: Project Pointers
As enterprisewide mobile security policy involves a delicate balancing act between cost, management, risk assessment and regulatory compliance.
Tips for setting up your own mobile strategy.